mirror of https://github.com/openresty/openresty
backported the patch to the nginx core for the latest SPDY security vulnerability (CVE-2014-0133).
parent
d21cc33749
commit
37ba2b1015
@ -0,0 +1,11 @@
|
|||||||
|
--- src/http/ngx_http_spdy.c
|
||||||
|
+++ src/http/ngx_http_spdy.c
|
||||||
|
@@ -1849,7 +1849,7 @@ static u_char *
|
||||||
|
ngx_http_spdy_state_save(ngx_http_spdy_connection_t *sc,
|
||||||
|
u_char *pos, u_char *end, ngx_http_spdy_handler_pt handler)
|
||||||
|
{
|
||||||
|
-#if (NGX_DEBUG)
|
||||||
|
+#if 1
|
||||||
|
if (end - pos > NGX_SPDY_STATE_BUFFER_SIZE) {
|
||||||
|
ngx_log_error(NGX_LOG_ALERT, sc->connection->log, 0,
|
||||||
|
"spdy state buffer overflow: "
|
Loading…
Reference in New Issue